Skip to end of banner
Go to start of banner

Saddington et al., 1988

Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

Version 1 Current »

Type

Book

Title

Security for small computer systems — a practical guide for users

Authors

Saddington, T., Deehan, C., Kwong, F., Ginn, R., March, R., Houthooft, M., Jorissen, F., Todd, P., Wylie, I.

Year

1988

Harvard

Saddington, T., Deehan, C., Kwong, F., Ginn, R., March, R., Houthooft, M., Jorissen, F., Todd, P., Wylie, I., 1988. Security for small computer systems — a practical guide for users, Computer Law & Security Review. https://doi.org/10.1016/0267-3649(89)90156-8 ISSN: 02673649

IDs

ISBN: 0-946395-50-0

Abstract

This book has been written to help you, the end user of a small computer system,
decide whether or not your system is "secure", and if not, what to do about
it. Your system may be a stand alone micro-computer or word-processor, a small
mini-computer, or any of these connected to a network. You could be using
software packages - spread sheets, word-processing, database, accounting etc -
or purpose-written software. Whatever you use your system for you have one
thing in common with all other computer users - you are storing and processing
information. The information may vary in value, but even the most trivial data
has a value (even if only the cost of the time taken to enter it), and will need
protecting.

()

  • No labels